Information Security

Information Security is one of Centauri’s strenghts.

Consider us the 911 of Information Technology. When a concern or an incident arises, our staff takes a 360-degree view, from technological detail to executive and market pressures that bear on the situation. Our experience allows us to integrate all these factors into pragmatic solutions to solve the concerns.

We have designed and implemented information security platforms for the private and public sectors, which have operated successfully and with high visibility for years at a nationwide scale. We have designed, implemented and supervised complete information security management schemes for large operations.

We combine considerable experience, academic training, industry certifications and innovation skills to link your business aspirations to specific security objectives. We insist on being able to trace the relevance of the proposed security controls and their associated investments to the organization’s business objectives. We like technology, we like to do a good job, we enjoy what we do.

MANAGED SECURITY (SOC 24X7)

Intruders never rest, and neither do we. Using advanced tools and highly qualified analysts we stay on the watch to protect you. Be at ease while we mind your information security.

PENTEST

Put your cyber defenses to the test. Based on years of experience, our specialized team will emulate attacks to check how a real life intruder could penetrate and abuse your information platform.

CODE SECURITY DESIGN OR REVIEW

We review your code to uncover security flaws, vulnerabilities, backdoors and other threats.  Preferably, we help in the code security design from the beginning of the software lifecycle, to prevent risks and delays.

SECURITY POLICIES

Intuition and talent are important but not enough. We build or evaluate your security policies to ensure they are comprehensive,  without loopholes or fuzziness, but reasonable given the nature of your organization.

SECURITY MANAGEMENT

Tools are important, but operating them correctly is even more important. Our security management scheme will give you total control over your security operations, management and government, plus you will count on our expert advice for continuous improvement.

INCIDENT RESPONSE AND FORENSIC ANALYSIS

A security incident has happened. How do we respond? How did it start? What systems have been compromised? How do we  preserve forensic evidence? What do we tell regulatory agencies?

STAY-AT-HOME SECURITY REVIEW

Is your staff as well protected at home as they were in the corporate network? Let us review their equipment, defenses, connection protocols and assess the risk to your organization.

SECURITY GAP ANALYSIS AND SYSTEM AUDIT

We review your architecture against industry standards and tell you how to comply.

RISK ANALYSIS

The disconnection between security investments and real life risks is a serious yet common flaw. In security, protection should be planned based on a risk assessment; the more thoughtful, well argued and weighted, the better.

BUSINESS CONTINUITY

Don’t leave it to chance. We help you build and test your plans so that, when the time comes, the business impact is manageable and the recovery process is quick and efficient.

SECURITY INFRASTRUCTURE AND ARCHITECTURE DESIGN

The effectiveness of security controls is not the sum of their individual benefits and functions.  A sound design mindful of the architecture is a critical element.

TRAINING AND LEARNING COACHING

Tailor-made training courses, or self-study coaching, for technical staff, managers and top executives. Taught by experts with high academic and professional credentials, recognized as specialists in the field, that conduct research and teach at universities.